Jump to ContentJump to Main Navigation
Harboring DataInformation Security, Law, and the Corporation$
Users without a subscription are not able to see the full content.

Andrea M. Matwyshyn

Print publication date: 2009

Print ISBN-13: 9780804760089

Published to Stanford Scholarship Online: June 2013

DOI: 10.11126/stanford/9780804760089.001.0001

Show Summary Details
Page of

PRINTED FROM STANFORD SCHOLARSHIP ONLINE (www.stanford.universitypressscholarship.com). (c) Copyright Stanford University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in SSO for personal use.date: 16 September 2019

Information Security and Contracts

Information Security and Contracts

Contracting Insecurity: Software License Terms That Undermine Information Security

Chapter:
(p.159) 9 Information Security and Contracts
Source:
Harboring Data
Author(s):

Jennifer A. Chandler

Publisher:
Stanford University Press
DOI:10.11126/stanford/9780804760089.003.0010

This chapter examines software contracting through the lens of cybersecurity in order to analyze terms and practices that arguably reduce the general level of cybersecurity. The inspiration for this approach is the growing recognition that the cybersecurity problem is not merely a technical one, but is also dependent upon social and economic factors, including the applicable law. The first part of the chapter considers a series of clauses that undermine cybersecurity by suppressing public knowledge about software security vulnerabilities. The next part considers a range of practices (rather than license terms) that undermine cybersecurity. The final section turns to the question of what should be done, if anything, about license terms that undermine cybersecurity. In particular, it suggests that there are reasons to believe that such terms are the product of various market failures rather than a reflection of the optimal software license terms.

Keywords:   software contracting, cypersecurity, information security, data security, software security

Stanford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.